ETHICS |
Chapter 17 Application Computers |
Section Three : Cases |
from Robert N. Barger
1. ACCESS TO
INFORMATION CASE
2. ADMINISTRATOR-STUDENT
CASE
3. BORROWED HARDWARE CASE
4. CAR SALES CASE
5. CHAIN LETTER CASE
6. COMPUTER AS JURY CASE
7. COMPUTER CHEATING CASE
8. CULTURE CLASH CASE
9. CYBER CITY NETWORK
CASE
10. DECEASED STUDENT CASE
11. DONATION TO CHARITY CASE
12. FALSE SECURITY CASE
13. FILE TRANSFER CASE
14. FINGERING & PRIVACY
CASE
15. INTERNET FRAUD CASE
16. FREE SOFTWARE
CASE
17. GLASS COCKPIT CASE
18. GRAPHICS
APPROPRIATION CASE
19. INCAPACITATED
ADMINISTRATOR CASE
20. LIMITING SOFTWARE USE CASE
21. MEDICAL DIAGNOSIS CASE
22. SOFTWARE LICENSING CASE
23. SPAMMING? CASE
24. NUMERICALY
UNSTABLE CASE
25. EDITED FILE CASE
26. CLASS PROJECT CASE
27. HIDE FROM IRS CASE
28. IGNORE PROBLEM CASE
29. BAD SOFTWARE CASE
30. MAIL INSPECTION
CASE
31. FAKE SALE CASE
32. FIX BUG CASE
33. FINALS-WEEK CASE
34. SYSTEM PRIVILEGES
CASE
35. ALT-DEMONS CASE
36. SOFTWARE COPYING
CASE
37. PARASITE COMPUTING CASE
Individual Cases:
Whistleblowing & the Environment: The Case
of Avco Environmental (from
BusinessEthics.ca)
The Polluter's Dilemma
(from BusinessEthics.ca)
e-Health and Commercial Genetic Testing
(from BusinessEthics.ca)
Case Studies
http://ethics.acusd.edu/resources/cases/HomeOverview.asp
Proceed to the next section of the chapter by clicking here>> section.
© Copyright Stephen O Sullivan and Philip A. Pecorino 2002. All Rights reserved.
Return to: Table of Contents for the Online Textbook |